ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Comprehensive Study in Data Mining Frameworks for Intrusion Detection

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 7)

Publication Date:

Authors : ; ; ;

Page : 29-34

Keywords : Data Mining; Intrusion Detection System (IDS); Network Security; Misuse Detection; Anomaly Detection; Classification; Clustering; MADAM ID; ADAM; JAM;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on expanding every day. An Intrusion Detection System (IDS) is a system for detecting intrusions and reporting to the authority or to the network administration. Data mining techniques have been successfully applied in many fields like Network Management, Education, Science, Business, Manufacturing, Process control, and Fraud Detection. Data Mining for IDS is the technique which can be used mainly to identify unknown attacks and to raise alarms when security violations are detected. The purpose of this survey paper is to describe the methods/ techniques which are being used for Intrusion Detection based on Data mining concepts and the designed frame works for the same. We are also going to review the related works for intrusion detection.

Last modified: 2014-11-25 19:18:49